Claim Missing Document
Check
Articles

Found 4 Documents
Search

Implementasi Multi Server Data Storage Pada Cloud Computing Jasnica Huang; Yuli Fitrisia; Muhammad Arif Fadhly Ridha
Jurnal Komputer Terapan  Vol. 4 No. 2 (2018): Jurnal Komputer Terapan November 2018
Publisher : Politeknik Caltex Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (685.314 KB)

Abstract

Kebutuhan akan informasi yang selalu up-to-date dan bisa diakses dimana saja dan kapan saja semakin meningkat. Hal ini menyebabkan perlu adanya layanan cloud berupa data storage yang high availability. Dengan adanya high availability, dapat membantu mengurangi terjadinya kegagalan server. Salah satu cara untuk meningkatkan kualitas layanan tersebut, yaitu mengimplementasikan multi server data storage. Implementasi yang dilakukan menerapkan beberapa teknik seperti data replication, load balancing dan failover. Data replication menggunakan GlusterFS, load balancing menggunakan HAProxy dan failover menggunakan Heartbeat. Dari hasil penelitian ini didapatkan bahwa rata – rata data berhasil di unggah 84.5 % dan di unduh kembali 100% dari data storage. Hasil keberhasilan metode failover didapatkan rata – rata keberhasilan 66.67% dalam melakukan peralihan meskipun salah satu server mengalami kegagalan, lalu penyebaran request dibagi secara merata 50:50 oleh load balancing. Sementara itu, performansi server menunjukkan bahwa delay pada layanan dikategorikan dalam “Sangat Bagus” dan throughput dikategorikan dalam “Bagus”. Kata kunci: data storage, high availability, data replication, load balancing, failover.
Implementasi Clustered Container Dengan Docker Sarm Suci Nurlita Putri Suci; Muhammad Arif Fadhly Ridha
ABEC Indonesia Vol. 9 (2021): 9th Applied Business and Engineering Conference
Publisher : Politeknik Caltex Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Rapid technological developments can encourage jobs in all fields. Technology is created based on ever-increasing needs and resources. However, the problem that often occurs is that high traffic causes the server to go down because the server is still using conventional computing, so that the server workload becomes heavy and overloaded. By using cluster computing technology, incoming processes can be distributed evenly among each device or hardware node. As technology advances, clusters can be combined with containers. One of the container technology management platforms is docker. Docker has one of its products, docker swarm, which can deploy containers on multiple hosts. When the server is on standby, conventional technology uses the highest CPU and memory. Where CPU usage is 6.2 ms and memory usage is 29.4%. And when the server is busy, conventional technology uses high amounts of CPU and memory. CPU usage is 4324.1 m/s and memory usage is 45%. So that the test results obtained that swarm technology can lighten the burden of server performance compared to conventional. Keywords: Container, Server, Docker, Swarm, CPU, Memory.
Implementasi Kubernetes Cluster Menggunakan KVM Nurul Khairina Surbakti Rina; Muhammad Arif Fadhly Ridha
ABEC Indonesia Vol. 9 (2021): 9th Applied Business and Engineering Conference
Publisher : Politeknik Caltex Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Rapid technological development requires services that can be accessed at any time. The increasing number of client requests will result in the server being down due to more workloads. Therefore, clusters are present to handle increased server workloads and evenly divide each server. However, to run a cluster requires cluster orchestration software that is Kubernetes. Kubernetes is used for container management. The virtualization technology used in Kubernetes is Kernel-Based Virtual Machine (KVM) virtualization. In this research, we compare latency, CPU usage, and memory usage when opening web pages, between conventional technology and Kubernetes cluster. The results of the highest latency test are 16614 ms by Kubernetes cluster and the lowest latency is 1522 ms by conventional technology. In conventional systems, the response from the user is directly received by the web server, processed and then sent. In Kubernetes clusters, there are nodes running on top of virtual machines, so it takes longer to respond. Good latency is low latency because it can open web pages faster. In the standby state, the lowest CPU usage and memory usage occurred in conventional were 0.07% and 28% because there were no nodes running on the virtual machine. In a busy state, the lowest CPU usage occurs on the Kubernetes cluster server is 1.06% due to the division of workload on virtual machines. The lowest memory usage occurs on a conventional server is 57% because there are no nodes running on a virtual machine.
IMPLEMENTASI DEVSECOPS DENGAN METODE STATIC APPLICATION SECURITY TESTING (SAST) MENGGUNAKAN SNYK PADA APLIKASI BERBASIS CONTAINER Muhammad Zhafran Rayhan; Muhammad Arif Fadhly Ridha
ABEC Indonesia Vol. 11 (2023): 11th Applied Business and Engineering Conference
Publisher : Politeknik Negeri Bengkalis

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This research proposes the use of DevSecOps with the Static Application Security Testing (SAST) approach using the Snyk platform to enhance efficiency and security in the software development process. The SAST methodology enables testing of potential cybersecurity exploits during the system's building and maintenance phases. By employing Snyk, a security scanning platform that can integrate with Integrated Development Environments (IDEs) and support container or cloud-based applications, developers can automatically and comprehensively scan their code, Quantitative testing was conducted by scanning 10 websites of Politeknik Caltex Riau, revealing a total of 1089 vulnerabilities, with the majority falling into the "Low" category. These findings indicate that low-level vulnerabilities dominate the tested systems. Meanwhile, qualitative testing was performed through interviews with programmers as the respondents. During the interviews, programmers stated that the use of Snyk SAST in the development process allowed them to detect security gaps before releasing to the public. They also found Snyk's recommendations and suggestions valuable for making improvements. Keywords: DevSecOps, Static Application Security Testing (SAST), Snyk, IDE, security vulnerabilities, software development.